Interference-protected control message transmission in a mobile communications network
For protecting transmission of a control message (60) in a mobile communications network between a first access node (10a) and a user equipment, an indication of at least one protected time-slot for transmitting the control message may be transmitted in response to a need for transmitting the control message (60). The indication is transmitted between the first access node (10a) and a second access node (10b). Transmission of the indication prompts reduction of spectral interference caused by the second access node (10b) during the at least one protected time-slot (30).
Latest Telefonaktiebolaget LM Ericsson (publ) Patents:
The present application relates to a method of transmitting a control message in a mobile communications network between a first access node and a user equipment and to corresponding devices, e.g. access node.
BACKGROUNDIn mobile communications networks, such as 3GPP networks (3GPP: Third Generation Partnership Project), there is a continuing need for higher data throughput. In order to achieve higher throughputs, various techniques are employed. One approach is to extensively use the limited frequency resources to obtain wide frequency bands for radio communication. This can result in a situation where two or more access nodes communicate over radio interfaces with UEs (UE: user equipment) using at least partially overlapping frequency bands.
If the two or more access nodes use at least partially overlapping frequency bands, spectral interference is likely to occur. Spectral interference can describe a situation where the radio interface between a UE and a first access node is disturbed by a radio interface of a second access node emitting power in the same frequency bands.
Spectral interference can have different effects. One possible effect is a degraded reliability of the radio interface, i.e., a higher probability for lost data packets or radio frames. This may effect the experienced communication quality in an undesired manner: voice communication may be disturbed and data communication may be delayed. In certain scenarios, even the connection between the UE and the respective access node may be lost.
A situation of spectral interference can, in particular, occur for so-called Heterogeneous Networks (HetNets). In HetNets, an access node with comparably large coverage, also referred to as macro access node, is supplemented by one or more access nodes of lower power which hence have a smaller coverage (cell size). Latter low-power access nodes are sometimes referred to as pico access nodes and can be deployed closer to the end users, e.g., on street level. Pico access nodes may be situated, preferably, in areas encountering large amounts of data traffic where there is a large demand for capacity. The pico access nodes can then reduce the load imposed on the macro access node and thereby help to increase overall throughput. Often, pico and macro nodes have at least partially overlapping cells.
In HetNets, a situation where the pico access nodes share the same frequency bands with the macro access nodes often occurs. In particular, a so-called frequency reuse of 1 is often employed where, both, macro and pico access nodes share the entire spectrum to maximize throughput. In other words: different signals may be transmitted via the same frequency band. Due to the overlapping cells, a situation of increased spectral interference may occur.
To reduce spectral interference in HetNets, inter-cell interference coordination (ICIC) can be employed. The different participating access nodes can negotiate static rules which define their share of the transmission resources in time domain and/or frequency domain. The different access nodes are therefore synchronized with each other in coordinated transmission schemes. When data traffic occurs, this data traffic is distributed into the allocated resources and thereby protected against spectral interference. For example, an access node may schedule transmission over the radio interface with a UE to a certain time-slot and/or frequency band where low spectral interference is expected based on the previously negotiated ICIC rules. For examples, the negotiated ICIC rules define a certain pattern where every n-th transmission frame of the radio interface encounters low spectral interference.
In this context, the concept of almost blank subframes (ABS) is known for the 3GPP Long Term Evolution (LTE) standard: such subframes (radio frames of the radio interface in the LTE standard) comprise a very limited amount, i.e., less than possible, of data to reduce usage of the frequency band. In ABS, for example only Cell Specific Reference Symbols (CRS) and possibly some control channel (CCH) data are transmitted in an ABS; in effect, the respective access node can be considered turned off or muted during the ABS.
However, such solutions based on ICIC encounter some limitations. For example, the overall throughput of the mobile communications network may be considerably reduced due to restrictions imposed by the shared transmission resources. Furthermore, the flexibility of protection is limited as such negotiated rules are comparably static.
Therefore, a need exists to provide efficient techniques for providing increased transmission reliability by decreasing spectral interference. In particular, a need exists for providing efficient techniques to protect transmissions against spectral interference.
SUMMARYAccording to an aspect, a method for protecting transmission of a control message in a mobile communications network between a first access node and a user equipment is provided. The method comprises, in response to a need for transmitting the control message, transmitting, between the first access node and a second access node, an indication of at least one protected time-slot for transmitting the control message. Said transmitting of the indication prompts reduction of a spectral interference caused by the second access node during the at least one protected time-slot.
According to a further aspect, an access node of a mobile communications network is provided. The access node comprises a first interface for communicating with a further access node and a second interface for communicating with a user equipment connected to the access node. The access node further comprises a processor being configured to control, in response to a need for transmitting a control message between the access node and the user equipment, transmission to the further access node of an indication of at least one protected time-slot. The at least one protected time-slot is for transmitting the control message. Said transmitting of the indication prompts reduction of a spectral interference caused by the further access node during the protected time-slot. The processor is further configured to control transmission of the control message to take place in the at least one protected time-slot.
According to a further aspect, an access node of a mobile communications network is provided. The access node comprises a first interface for communicating with a further access node and a second interface for connecting via a radio interface to one or more user equipment connected to the access node. The access node further comprises a processor being configured to control, in response to a need for transmitting a control message between the further access node and a user equipment connected to the further access node, transmission to the further access node of an indication of at least one protected time-slot. The at least one protected time-slot is for transmitting the control message. Said transmitting of the indication prompts reduction of a spectral interference caused by the access node during the protected time-slot. The processor is further configured to control an emitted spectral power on the radio interface during the least one protected time-slot to reduce the spectral interference with the further access node.
According to a further aspect, a system of access nodes of a mobile communications network is provided. The system comprises a first access node and a second access node. The first access node and/or the second access node are configured to transmit, in response to a need for transmitting a control message between the first access node and a user equipment, an indication of at least one protected time-slot, respectively to the other one of the first access node and/or the second access node. The at least one protected time-slot is for transmitting the control message. Said transmitting of the indication prompts a reduction of a spectral interference caused by the second access node during the at least one protected time-slot. The first access node is configured to transmit the control message in the at least one protected time-slot. The second access node is configured to reduce an emitted spectral power in the least one protected time-slot to reduce the spectral interference with the first access node.
According to a further aspect, a computer program product comprising program code to be executed by a processor of an access node is provided. Execution of the program code causes the access node to perform the above method for protecting transmission of a control message.
It is to be understood that the features mentioned above and those yet to be explained below may be used not only in the respective combinations indicated, but also in other combinations or in isolation without departing from the scope of the invention.
In the following, the invention will be explained in further detail with respect to embodiments illustrated in the accompanying drawings.
In the following, exemplary embodiments of the invention will be explained in more detail by referring to the accompanying drawings. The illustrated embodiments relate to techniques for protection of transmission of a control message in a mobile communications network between an access node and a UE. In particular, in the various embodiments at least one protected time-slot is used for said transmitting of the control message wherein during the protected time-slot reduced spectral interference is encountered. Thereby, an increased probability of successful transmission of the control message may be achieved. In the illustrated embodiments, protection of the control message is provided on-demand, e.g., on a per-request basis.
For this purpose, in response to a need for transmitting the control message, an indication of the at least one time-slot may be transmitted between a first access node, to which the UE is connected, and a second access node. The indication can be transmitted from the first access node to the second access node or vice versa.
The indication of the at least one protected time-slot may refer to an indication of a need for the time-slot and/or the indication various parameters, e.g., start, end, duration, of the time-slot. All indications may be explicit or implicit.
Transmitting the control message between the access node and the UE can refer to: transmitting the control message from the access node to the UE and/or transmitting the control message from the UE to the access node.
The access node can be a device for connecting to a UE via a radio interface. In the present mobile communications network, the radio interface may refer to a data connection over the air, i.e., wireless communication. The access node can comprise one or more physical entities and/or can be implemented using hardware and software.
For example, according to the 3GPP LTE standard, the access node may be implemented as an Evolved Universal Terrestrial Radio Access Network (UTRAN) Node B (eNodeB), cf.
First, turning to
Next, turning to
While different concepts and techniques of various embodiments of the present invention are described primarily with respect to the LTE standard hereinafter, this shall not be construed as being limiting. For example, the concepts can be employed for different mobile communications networks in a comparable manner, for example according to the 3GPP UMTS standard, the General System for Mobile communications (GSM), or the like. For the purpose of illustration, the following scenarios implementing the concepts of various embodiments according to the 3GPP LTE standard, may be useful.
In
While in general the techniques of the present invention allow for transmitting of any control message between the first eNodeB 10a and the UE 11, according to various embodiments this control message may be a Handover Command message send from the first eNodeB 10a to the UE 11. Therefore, for sake of illustration, hereinafter various concepts and techniques will be described with respect to a handover scenario, but may be applied to other control messages as well. In this handover scenario the UE 11 is handed over from the first eNodeB 10a to the further eNodeB 10c. A second eNodeB 10b, as well as the further eNodeB 10c, can cause spectral interference. Embodiments described below with respect to the first, second, and further eNodeBs 10a, 10b, 10c can be applied vice-versa to the respective other eNodeBs 10a, 10b, 10c.
The handover scenario—and more generally mobility management—according to the LTE standard is described in further detail below. For example, the UE 11 in LTE can be in two RRC states: “RRC_CONNECTED” and “RRC_IDLE”. In the “RRC_CONNECTED” state, a mobility of the UE 11 is network-controlled, i.e., decision and logic functionality related to the mobility of the UE 11 can be executed by, e.g., the eNodeB 10a. Such functions are typically based on, e.g., measurements and/or reports provided by the UE 11. In this respect, the eNodeB 10a can configure various measurement events, thresholds, or the like, based on which the UE 11 then sends the measurements and/or reports. Then a decision of a handover of the UE 11, e.g., from the first eNodeB 10a to a second eNodeB (not shown in
A particular handover scenario is described hereinafter with respect to
Because the UE 11 moves out of the cell of the first eNodeB 10a, it should be handed over to a neighbouring cell of a further eNodeB 10c. This cell is also referred to as target cell. The handover should occur before loosing the connection between the UE 11 and the first eNodeB 10a. It can be desirable that the connection is maintained without no or minimal disruption throughout the handover. No or minimal disruption may refer to the user of the UE 11 being unaware of the ongoing handover. In the embodiment of
A handover may involve a number of steps. Initially, a measurement report may be transmitted from the UE 11 to the first eNodeB 10a. For example, the measurement report may be transmitted from the UE 11 to the first eNodeB 10a in response to a so-called A3 event. Such an A3 event may refer to the situation that the signal level of the further eNodeB 10c is larger by a predefined amount that the signal level of the first eNodeB 10a to which the UE 11 is connected. Based on this, the first eNodeB 10a may determine a need for performing the handover in the handover decision. If the handover is required, the first eNodeB 10a may initiate preparation of the handover to the further eNodeB 10c. This may include, e.g., requesting a handover from the further eNodeB 10c. Then, a Handover Command message may be transmitted from the first eNodeB 10a to the UE 11 which commands the UE 11 to execute the handover from the first eNodeB 10a to the further eNodeB 10c.
In response to the received Handover Command message, the UE 11 establishes a connection to the further eNodeB 10c. If the transmission reliability of the radio interface 200 between the UE 11 and the first eNodeB 10a deteriorates significantly during the handover procedure as described above, there is a likelihood of a failed handover. In other words, the handover may not successfully complete and even the connection may be lost. For example, according to 3GPP TS 36.300 timers, timestamps, and thresholds are employed in order to adequately configure measurements, such that the need for the handovers is detected sufficiently early before the radio interface 200 deteriorates significantly.
Another reason for a deteriorated radio interface 200 reliability may be spectral interference encountered during the handover. In the scenario of
It may occur that a UE 11 looses connection to the first eNodeB 10a, e.g., when the UE 11 enters a fading dip or if the handover fails as set forth above due to the impaired radio interface 200. This is particularly true if a handover region is very small. A handover region may be defined as the region where, both, a signal level of the first eNodeB 10a to which the UE 11 is connected, as well as a signal level of the further eNodeB 10c to which the UE 11 is about to connect, are within a predefined range.
Such a situation is illustrated in
By monitoring quality of the radio interface 200, e.g. on the physical layer as described in 3GPP TS 36.300, TS 36.331, and TS 36.133, the UE 11 itself is able to declare a radio interface 200 failure and autonomously start a RRC re-establishment procedure. If the re-establishment is successful, then the connection between the UE 11 and the first eNodeB 10a can resume. A failure of a re-establishment can result in the UE 11 switching to the operation mode “RRC— IDLE” and release of the connection. To continue communication, a entirely new RRC connection can be requested and established. Handover failures are discussed in 3GPP Technical Report (TR) 36.839.
The first eNodeB 10a decides if it should handover the UE 11 to the further eNodeB 10c (“Handover Decision”). If so, the first eNodeB 10a requesting admission at the further eNodeB (step S3) and waits for acknowledgement (step S4) before transmitting a Handover Command message to the UE 11 (step S5). Typically, the Handover Command message of step S5 is prepared at least partly by the further eNodeB 10c and contained in the Handover Acknowledgement message of step S4.
The Handover Command message of step S5 contains necessary instructions for the UE 11 to execute the handover to the further eNodeB 10c. Based on this, the UE 11 connects to the further eNodeB 10c via a Random Access Request message containing a dedicated preamble (step S6). The further eNodeB 10c responds to this Random Access Request Message by the uplink (UL) grant and Timing Advance which relates to transmission timing and is estimated based on the preamble of step S6.
The UE 11 then confirms the handover to the further eNodeB 10c by indicating that the handover procedure is completed (step S8). This may be achieved by a so-called RRCConnectionReconfigurationComplete message.
The further eNodeB 10c sends a UE Context Release message to the first eNodeB 10a to inform success of the handover 210 of the UE 11 (step S9). The first eNodeB 10a can then release resources previously assigned to the UE 11.
As can be seen from the above, successful completion of the handover requires successful transmission of, at least, the Handover Command message in step S5 and the Random Access Request message in step S6. Various embodiments of the invention provide methods for transmitting such a control message during a protected time-slot during which reduction of spectral interference with further access nodes is prompted. As such messages can be critical to the success of the handover, this may have the effect of decreased failure likelihood of the handover.
For this, in response to a need for transmitting the control message, an indication of at least one protected time-slot for transmitting the control message is transmitted. In the embodiment of
The above transmission of the indication prompts reduction of the spectral interferences caused by the second access node 10b and/or the further access node 10c during the at least one protected time-slot. For example, when the indication is transmitted from the first eNodeB 10a to the further eNodeB 10c, this requests the further eNodeB 10c to reduce spectral interference during the respective at least one protected time-slot. Likewise, if the indication is transmitted from the further eNodeB 10c to the first eNodeB, this indicates that the further eNodeB will provide reduced spectral interference during the respective at least one protected time-slot. Accordingly, “prompting” reduced interference can mean requesting or reporting future reduction of spectral interference. Typically, this future reduction of spectral interference is temporary, e.g., provided only in the protected time-slot.
For sake of simplicity, in the following it will be assumed that the handover takes place between the first eNodeB 10a and the further eNodeB 10c and that the spectral interference is caused by the second eNodeB 10b. Yet it should be understood that various embodiments cover other configurations. For example, it is possible that the handover occurs between the first and second eNodeBs 10a, 10b. In other words it is possible that the target eNodeB causes the spectral interference. It is also possible that a plurality of eNodeBs cause spectral interference.
In
In
The second access node 10b is configured to reduce an emitted spectral power during the two protected time-slots 30. This is graphically indicated by the two dark subframes 110. Because the second eNodeB 10b reduces the emitted spectral power, the spectral interference with the first eNodeB 10a is reduced during the protected time-slots 30. The emitted spectral power may refer to the total power emitted into a certain frequency band. In the protected time-slot 30, the control message 60 can be transmitted by the first eNodeB 10a as indicated in
Various approaches to said reducing of the emitted spectral power are discussed hereinafter. For example, it is possible that the second eNodeB 10b limits the transmit power to a predefined value and/or by a predefined amount during the protected time-slot 30. The transmit power may relate to the overall power level used for transmission by the eNodeB 10b and may be measured in dBm.
Additionally or alternatively, may also be possible to partly or fully interrupt, i.e. temporarily intermit, transmission of control data and/or payload data. In a simple embodiment, it is possible to fully interrupt transmission of the second eNodeB 10b during the protected time-slot 30. In various embodiments, the transmission may be partly interrupted. This may be achieved, e.g., by using ABS. Another approach is to use Multicast-Broadcast Single Frequency Network (MBSFN) subframes as defined by the 3GPP TS 36.331. In latter case, uplink scheduling grants can still be communicated between a target eNodeB and the UE 11, since in MBSFN subframes typically the control region is not interrupted.
When using a ABS or MBSFN subframes, parts or the entire subframe 110 are not carrying data (muted). Due to load conditions at the second eNodeB 10b and due to the size of control message 60, sometimes it might not be desirable to mute an entire subframe 110. This may be particularly true if the second eNodeB 10b is a macro eNodeB of a HetNet which, e.g., is connected to a large number of UEs. Therefore, a reduction of the transmit power may be employed instead. Albeit in various embodiments it may be employed additionally to embodiments as described above. In such embodiments, it may be easier for the second eNodeB 10b to perform the respective scheduling of transmission: the second eNodeB 10b can still schedule communication with further UEs not requiring high transmit power during the protected time-slot 30. Such further UEs may be physically near to the second eNodeB 10b. Such subframes with reduced transmit power may be referred to reduced power subframes (RPS). When using RPS, the amount of transmit power reduction can be communicated between the involved access nodes, e.g., the first and second access nodes 10a, 10b.
Concepts for said reducing of the emitted spectral power can be applied to the entire frequency spectrum or only fractions thereof, i.e., to one or more frequency bands. Such frequency bands may be predefined or can be included in said transmitting of the indication; they may be, in other words, be negotiated between the first and second eNodeBs 10a, 10b.
In
The
In the foregoing, techniques for reducing the emitted spectral power 311 during the protected time-slot 30 have been discussed. In the following, techniques for transmitting the indication of the protected time-slot 30 will be discussed in further detail.
As shown by
However, it should be understood that it is not necessary to transmit both messages 100, 101. For example, in various embodiment, both first and second eNodeBs 10a, 10b can be configured to handle the indaction of the at least one protected time-slot 30 implicitly. I.e., the first eNodeB 10a can indicate the at least one protected time-slot 30 to the second eNodeB 10b even if it did not receive a request, and/or vice versa. In case the at least one protected time-slot 30 is indicated to the first eNodeB 10a, it can schedule said transmitting of the control message 60 in at least some of the at least one protected time-slot 30, even if the first eNodeB 10a did not request the at least one protected time-slot 30 before.
Turning to
In
In
In
In
Such information, as discussed above with respect to the first message 100, may also be included in the second message 101. For example, if a plurality of protected time-slots 30 is used, the power reduction level 312 could be included for each one of the plurality of protected time-slots 30. Furthermore, it is possible to include information on the frequency bands 305 for which emitted spectral power 311 shall be reduced, cf.
Generally speaking, it is possible to include a step of selecting the protected time-slot 30 in the first access node 10a and/or the second access node 10b. The selecting can be based on various information such as the urgency of the transmitting, the spectral interference level, and/or the power reduction level 312 etc. The logic of the selecting of the protected time-slot 30 can be situated fully or in parts in either the first or second access node 10a, 10b. This is closely related to the information content of the particular first message 100 and/or second message 101 that are exchanged between the first and second access nodes 10a, 10b. To this respect, the first message 100 may be referred to as a time-slot request message and the second message 101 may be referred to as a time-slot reply message. Implementations where the selecting is situated in the first eNodeB 10a can be, as for example illustrated in
Irrespective of the particular embodiment of the indication, e.g., irrespective what particular sort of indicators 105 according to the embodiments of
For example, for this purpose parts of the conventional 3GPP TS 36.423 standard may be re-used. For example, this applies to the Invoke Indication as defined in TS 36.423, sub-clause 9.2.55 which could be used to request a second message 101 as indicated in
For example, the Handover Request message as defined in 3GPP TS 36.423, sub-clause 9.1.1.1 could be supplemented by a respective field, e.g., called “ABS Request”, e.g., with assigned criticality set to “ignore”. This field might have a mandatory presence or an optional presence and contain optional sub-fields such as the urgency indication or the candidate time-slots. This field could, in other words, correspond to the first message 100.
For example, the Handover Request Acknowledge message as defined in 3GPP TS 36.423, sub.-clause 9.1.1.2 could be supplemented by a respective field, e.g., called “ABS Grant”, e.g., with assigned criticality set to “ignore”. This field could indicate if a prior request for on demand ABS was granted and, optionally, indicate additionally which time-slots 30 were granted, or for how long a certain pattern of protected time-slots 30 is applied. This field might have a mandatory presence or an optional presence. This field could, in other words, correspond to the second message 101.
It may therefore be possible to send the first and second messages 100, 101, e.g., as part of the messages exchanged in steps S3 and S4 in
In
In a simple embodiment, always when the need for transmitting the control message 60 is determined, e.g., as a result of step T2a, the indication of the at least one protected time-slot 30 is transmitted (steps T3, T4). However, it is also possible to base said transmitting, i.e., the employment of the at least one protected time-slot 30 on an optional decision finding (step T2b). The decision-finding can determine whether it is at all necessary to use further protection or if, e.g., the loss likelihood of the control message 60 given certain parameters is sufficiently small. In the embodiment of
Similar criteria as stated above in connection with the establishing of the need of the at least one-protected time-slot in step T2b can be applied to the handover decision finding in step T2a.
In the embodiment of
In
For example, the time-slot response 101 of step U6 may correspond to the embodiment of
In the protected time-slot 30, e.g., as indicated via the messages 100, 101 of steps U3, U6, the first eNodeB 10a sends the Handover Command message (step S7) to trigger the handover 210 of the UE 11 to the further eNodeB 10c. Step S7 corresponds to step T5 of
In
In
For example, step V5 can be repeated for transmission to a plurality of further eNodeBs (not shown in
The preceding FIGs. have been discussed mainly with respect to the single UE 11. In various embodiments, the techniques are extended to support transmission of control messages 60 to and from multiple UEs 11 connected to the first eNodeB 10a. The first eNodeB 10a, over a certain period of time, pools or collects a number of measurement reports (cf.
In
In step SA3, it is established whether protection is required for the Handover Command message, i.e., whether there is a need for the at least one protected time-slot 30. Said establishing can be based on a number of parameters, e.g., signal levels of the participating eNodeBs 10a, 10b, 10c measured at the UE 11, transmit powers of the participating eNodeBs 10a, 10b, 10c, a CQI, etc. If there is no need for protection of the Handover Command message 60, the handover can be executed with no particular scheduling imposed in step SA4. Step SA4 may include the steps S3 ff. of
Otherwise, if there is a need for protection, in step SA5, the at least one protected time-slot 30 is selected in the first eNodeB 10a from a plurality of candidate time-slots. Said selecting may be based on the urgency of the handover, a count of pending handovers, a velocity of the UE 11, preconfigured rules, and/or a data traffic load of the eNodeBs 10a, 10b etc. The candidate time-slots may be time-slots as defined by an ICIC pattern and/or all upcoming time-slots and/or all upcoming timeslots after an offset delay.
Then, in step SA6, the indication of the at least one protected time-slot 30 is transmitted. In various embodiments, step SA6 includes sending the first message 101 from the first eNodeB 10a to the second eNodeB 10b including the indicators 105 indicating the at least one time-slot 30, either implicitly or explicitly, cf.
It should be noted that it is also possible to execute step SA5 after step SA6, e.g., if the selecting of the at least one protected time-slot 30 is executed in the second eNodeB 10b. Then, also the indicating of step SA6 may comprise different information and/or messages. For example, in such an embodiment, the indicating in step SA6 may comprise the second message 101 from the second eNodeB 10b to the first eNodeB 10a including the indicators 105 indicating the at least one time-slot 30, either implicitly or explicitly.
It is also possible that the selecting of step SA5 is part of a negotiation between the first and second eNodeBs 10a, 10b, i.e., conducted in, both, eNodeBs 10a, 10b. In this respect, the steps SA5 and SA6 do not need to be separated steps, but rather may be combined in a single procedure. In particular in such an embodiment, step SA6 may comprise the sending of the first and second messages 101, 102 as request and reply messages; this is illustrated in the flowchart of
Turing again to
Once the at least one protected time-slot 30 is determined and, both, eNodeBs 10a, 10b are informed respectively, the first eNodeB 10a schedules transmission of the Handover Command message for the at least one protected time-slot 30. This means that transmission of the Handover Command occurs in at least some of the at least one protected time-slot 30.
However, if in the meantime the handover is immediately required (step SA8), this may be signalled to the second eNodeB 10b (step SA9) and the handover executed at once (step SA4). Likewise, if the handover is not required at all anymore, the procedure may be stopped. Such steps can be executed as part of the conditional loop of
Otherwise, the handover is executed during at least some of the at least one protected time-slot 30 (step SA10). In other words: the first access node 10a transmits the control message 60 in the at least one protected time-slot 30. This means that transmission of the Handover Command occurs during at least some of the at least one protected time-slot 30.
If there are multiple queued handovers pending (step SA11), they may be grouped and the respective Handover commands may all be transmitted in the at least one protected time-slot 30.
Otherwise, the method may end at step SA12.
It is possible to inform further eNodeBs, e.g., peer eNodeBs and/or interfering eNodeBs, of the at least one protected time-slot 30 before step SA8. This is illustrated in the flowchart of
Concluding, it has been shown that according to various embodiments means are provided to protect—on demand—the transmission of the control message against spectral interference. In particular, various embodiments allow to improve the handover performance within an 3GPP standardized LTE mobile communications network, e.g., including a HetNet deployment. Especially the transmission of the Handover Command message from the source eNodeB to a UE is improved by protecting it from spectral interference from one or more interfering eNodeBs. In various embodiments, this is achieved by muting the one or more interfering eNodeBs in certain subframes on demand. In this respect, the ABS and/or MBSFN functionality can be reused for the muting. RBS radio frames can be alternatively or additionally employed. E.g., in case the target eNodeB of the handover is also an interfering eNodeB, the demand for the muting can be included in standardized handover preparation messages between source and target eNodeBs.
The on-demand basis of the protection of the control message 60 allows for low performance restrictions when executing such techniques, both, at the source eNodeB, as well as in the interfering eNodeBs.
Although the invention has been shown and described with respect to certain preferred embodiments, equivalents and modifications will occur to others skilled in the art upon the reading and understanding of the specification. The present invention includes all such equivalents and modifications and is limited only by the scope of the appended claims.
For example, the control message 60 has been mainly discussed with respect to the Handover Command message, cf.
Furthermore, while embodiments have been mainly discussed with respect to the 3GPP LTE standard, it is possible to employ the respective techniques for mobile communications networks based on other standard.
Claims
1. A method of protecting transmission of a control message, in a mobile communications network, between a first access node and a user equipment, the method comprising:
- in response to a need for transmitting the control message, transmitting, between the first access node and a second access node, an indication of at least one protected time-slot for transmitting the control message; the transmitting of the indication prompting reduction of spectral interference caused by the second access node during the at least one protected time-slot;
- wherein the transmitting of the indication of the at least one protected time-slot is part of negotiating of the at least one protected time-slot between the first access node and the second access node, the negotiating including: sending, from the first access node to the second access node, a request message indicating a plurality of candidate time-slots from which the at least one protected time-slot is selected; and receiving, from the second access node, an acknowledgement message positively and/or negatively acknowledging candidate time-slots from which the at least one protected time-slot is selected.
2. The method of claim 1:
- wherein the control message is a handover command commanding the user equipment to execute a handover from the first access node to a different access node;
- further comprising transmitting the handover command from the first access node to the user equipment.
3. The method of claim 2, wherein the different access node is the second access node.
4. The method of claim 1, wherein the indication of the at least one protected time-slot is transmitted as part of a handover request message.
5. The method of claim 1, wherein the indication of the at least one protected time-slot is transmitted as part of a handover request reply message.
6. The method of claim 1, further comprising the first access node transmitting the control message in the at least one protected time-slot.
7. The method of claim 1, further comprising the second access node reducing an emitted spectral power in the least one protected time-slot to reduce the spectral interference with the first access node.
8. The method of claim 7, wherein the reducing of the emitted spectral power comprises at least one of:
- limiting a transmit power of the second access node to a predefined value;
- at least partly interrupting the transmission of control data and/or payload data;
- at least partly interrupting the transmission of control data and/or payload data on at least one frequency band of the spectrum.
9. The method of claim 1, further comprising the first access node and/or the second access node selecting the at least one protected time-slot from the plurality of candidate time-slots.
10. The method of claim 9, wherein the selecting is based on at least one of:
- an urgency of the transmitting of the control message, wherein the urgency is a measure of the desired delay until the transmitting of the control message;
- a velocity of the user equipment;
- a data traffic load of the first access node and/or the second access node;
- a count of pending handovers;
- preconfigured rules.
11. The method of claim 1, wherein the at least one protected time-slot is defined with respect to at least one radio frame of a sequence of radio frames used for data communication over a radio interface in the mobile communications network.
12. The method of claim 11, wherein the indication explicitly indicates the at least one radio frame by means of at least one sequence number and/or the indication implicitly indicates the at least one radio frame by means of a predefined rule.
13. The method of claim 1, further comprising the first access node and/or the user equipment determining the need for transmitting the control message.
14. The method of claim 13, wherein the determining of the need for transmitting the control message is based on at least one of:
- a signal level of the first access node measured at the user equipment;
- a signal level of the second access node measured at the user equipment;
- a transmit power of the first access node;
- a transmit power of the second access node;
- a signal level of the at least one further access node measured at the user equipment;
- a transmit power of the at least one further access node;
- a channel quality report;
- history information on previously transmitted control messages;
- a handover need;
- a count of pending handover needs;
- a velocity of the user equipment;
- preconfigured rules.
15. The method of claim 1, further comprising:
- in response to the need for transmitting the control message, determining whether the at least one protected time-slot is required;
- wherein the transmitting of the indication is selectively executed based on the determination of whether the at least one protected time-slot is required.
16. The method of claim 1, wherein the control message is at least one of:
- a handover message transmitted from the first access node to the user equipment, the handover message commanding the user equipment to execute a handover from the first access node to a further access node;
- a downlink control message transmitted from the first access node to the user equipment, the downlink control message comprising a grant to the user equipment for transmission on an uplink;
- a downlink control message transmitted from the first access node to the user equipment, the downlink control message comprising a command for configuration of a connectivity of the user equipment to access nodes and/or carriers;
- an uplink control message transmitted from the user equipment to the first access node;
- a channel quality report transmitted from the user equipment to the first access node.
17. An access node of a mobile communications network, the access node comprising:
- a first interface for communicating with a further access node;
- a second interface for communicating with a user equipment connected to the access node;
- a processing circuit configured to: control, in response to a need for transmitting a control message between the access node and the user equipment, transmission, to the further access node, of an indication of at least one protected time-slot for transmitting the control message; the transmitting of the indication prompting reduction of spectral interference caused by the further access node during the protected time-slot; control transmission of the control message to take place in the at least one protected time-slot; negotiate the at least one protected time-slot with the further access node, the negotiating including: controlling the transmission of the indication; sending a request message to the further access node, the request message indicating a plurality of candidate time-slots from which the at least one protected time-slot is selected; receiving, from the further access node, an acknowledgement message positively and/or negatively acknowledging candidate time-slots from which the at least one protected time-slot is selected.
18. The access node of claim 17, wherein the processing circuit is further configured to determine the need for transmitting the control message.
19. The access node of claim 17, wherein the processing circuit is further configured to:
- determine, in response to the need for transmitting the control message, whether the protected time-slot is required;
- selectively execute the transmitting of the indication based on the determination of whether the protected time-slot is required.
20. A method of protecting transmission of a control message, in a mobile communications network, between a first access node and a user equipment, the method comprising:
- in response to a need for transmitting the control message, transmitting, between the first access node and a second access node, an indication of at least one protected time-slot for transmitting the control message; the transmitting of the indication prompting reduction of spectral interference caused by the second access node during the at least one protected time-slot;
- wherein the transmitting of the indication of the at least one protected time-slot is part of negotiating of the at least one protected time-slot between the first access node and the second access node, the negotiating including: the second access node receiving, from the first access node, a request message indicating a plurality of candidate time-slots from which the at least one protected time-slot is selected; and the second access node sending an acknowledgement message to the first access node, the acknowledgement message positively and/or negatively acknowledging candidate time-slots from which the at least one protected time-slot is selected.
21. An access node of a mobile communications network, comprising:
- a first interface for communicating with a further access node;
- a second interface for connecting via a radio interface to one or more user equipment connected to the access node;
- a processing circuit configured to: control, in response to a need for transmitting a control message between the further access node and a user equipment connected to the further access node, transmission to the further access node of an indication of at least one protected time-slot for transmitting the control message, the transmitting of the indication prompting reduction of a spectral interference caused by the access node during the protected time-slot; control an emitted spectral power on the radio interface during the least one protected time-slot to reduce the spectral interference with the further access node; negotiate the at least one protected time-slot with the further access node, the negotiating including: controlling the transmission of the indication, receiving a request message from the further access node, the request message indicating a plurality of candidate time-slots from which the at least one protected time-slot is selected; sending an acknowledgement message to the further access node, the acknowledgement message positively and/or negatively acknowledging candidate time-slots from which the at least one protected time-slot is selected.
22. A computer program product stored in a non-transitory computer readable medium for protecting transmission of a control message, in a mobile communications network, between a first access node and a user equipment, the computer program product comprising software instructions which, when run on a processing circuit of the first access node, causes the first access node to:
- in response to a need for transmitting the control message, transmit, between the first access node and a second access node, an indication of at least one protected time-slot for transmitting the control message; the transmitting of the indication prompting reduction of spectral interference caused by the second access node during the at least one protected time-slot;
- wherein the transmitting of the indication of the at least one protected time-slot is part of negotiating of the at least one protected time-slot between the first access node and the second access node, the negotiating including: sending, from the first access node to the second access node, a request message indicating a plurality of candidate time-slots from which the at least one protected time-slot is selected; and receiving, from the second access node, an acknowledgement message positively and/or negatively acknowledging candidate time-slots from which the at least one protected time-slot is selected.
23. A computer program product stored in a non-transitory computer readable medium for protecting transmission of a control message, in a mobile communications network, between a first access node and a user equipment, the computer program product comprising software instructions which, when run on a processing circuit of a second access node, causes the second access node to:
- in response to a need for transmitting the control message, transmit, between the first access node and a second access node, an indication of at least one protected time-slot for transmitting the control message; the transmitting of the indication prompting reduction of spectral interference caused by the second access node during the at least one protected time-slot;
- wherein the transmitting of the indication of the at least one protected time-slot is part of negotiating of the at least one protected time-slot between the first access node and the second access node, the negotiating including: the second access node receiving, from the first access node, a request message indicating a plurality of candidate time-slots from which the at least one protected time-slot is selected; and the second access node sending an acknowledgement message to the first access node, the acknowledgement message positively and/or negatively acknowledging candidate time-slots from which the at least one protected time-slot is selected.
20080232284 | September 25, 2008 | Dalsgaard |
20090207784 | August 20, 2009 | Lee |
20120157108 | June 21, 2012 | Boudreau |
20150023261 | January 22, 2015 | Lunttila |
20160081035 | March 17, 2016 | Damnjanovic |
2451214 | May 2012 | EP |
2006098665 | September 2006 | WO |
- 3rd Generation Partnership Project, “3rd Generation Partnership Project; Technical Specification Group Radio Access Network; Evolved Universal Terrestrial Radio Access Network (E-UTRAN); X2 application protocol (X2AP) (Release 11)”, Technical Specification, 3GPP TS 36.423 V11.1.0, Jun. 1, 2012, pp. 1-134, 3GPP, France.
- 3rd Generation Partnership Project, “3rd Generation Partnership Project; Technical Specification Group Radio Access Network; Evolved Universal Terrestrial Radio Access (E-UTRA); Radio Resource Control (RRC); Protocol specification (Release 11)”, Technical Specification, 3GPP TS 36.331 V11.0.0, Jun. 1, 2012, pp. 1-302, 3GPP, France.
- 3rd Generation Partnership Project, “3rd Generation Partnership Project; Technical Specification Group Radio Access Network; Evolved Universal Terrestrial Radio Access (E-UTRA); Mobility enhancements in heterogeneous networks (Release 11)”, Technical Report, 3GPP TR 36.839 V11.0.0, Sep. 1, 2012, pp. 1-53, 3GPP, France.
- 3rd Generation Partnership Project, “3rd Generation Partnership Project; Technical Specification Group Radio Access Network; Evolved Universal Terrestrial Radio Access (E-UTRA) and Evolved Universal Terrestrial Radio Access Network (E-UTRAN); Overall description; Stage 2 (Release 11)”, Technical Specification, 3GPP TS 36.300 V11.2.0, Jun. 1, 2012, pp. 1-201, 3GPP, France.
- Zte, “Discussion on the mobility performance enhancement for co-channel HetNet deployment”, 3GPP TSG-RAN WG2 Meeting #75bis, Oct. 10, 2011, pp. 1-8, R2-114950, Zhuhai, China.
- 3rd Generation Partnership Project, “3rd Generation Partnership Project; Technical Specification Group Radio Access Network; Evolved Universal Terrestrial Radio Access (E-UTRA); Requirements for support of radio resource management (Release 11)”, Technical Specification, 3GPP TS 36.133 V11.1.0, Jun. 1, 2012, pp. 1-652, 3GPP, France.
Type: Grant
Filed: Sep 28, 2012
Date of Patent: Sep 13, 2016
Patent Publication Number: 20150249938
Assignee: Telefonaktiebolaget LM Ericsson (publ) (Stockholm)
Inventors: Torsten Dudda (Aachen), Michael Meyer (Aachen), Elena Myhre (Järfälla), Oumer Teyeb (Solna), Stefan Wager (Espoo)
Primary Examiner: Afsar M Qureshi
Application Number: 14/430,288
International Classification: H04W 36/00 (20090101); H04W 72/04 (20090101); H04W 88/08 (20090101);